Murugesan et al., 2013 - Google Patents
Password Authentication Scheme Based On Shape and Text for Secure Sharing Of PHR Using ABE in CloudMurugesan et al., 2013
- Document ID
- 1884801820606275777
- Author
- Murugesan K
- Anjana T
- Publication year
- Publication venue
- International Journal of Soft Computing and Engineering (USCE)
External Links
- 238000000034 method 0 abstract description 16
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Chinnasamy et al. | HCAC-EHR: hybrid cryptographic access control for secure EHR retrieval in healthcare cloud | |
Fabian et al. | Collaborative and secure sharing of healthcare data in multi-clouds | |
Sharma et al. | RSA based encryption approach for preserving confidentiality of big data | |
Tong et al. | Cloud-assisted mobile-access of health data with privacy and auditability | |
US10320765B2 (en) | Method and system for securing communication | |
US20210392003A1 (en) | Decentralized computing systems and methods for performing actions using stored private data | |
WO2020123926A1 (en) | Decentralized computing systems and methods for performing actions using stored private data | |
Wenhua et al. | A lightweight security model for ensuring patient privacy and confidentiality in telehealth applications | |
Xu et al. | Enabling authorized encrypted search for multi-authority medical databases | |
CA3066701A1 (en) | Controlling access to data | |
Saravanan et al. | Lattice based access control for protecting user data in cloud environments with hybrid security | |
Suresh et al. | Securing personal health record system in cloud using user usage based encryption | |
Deng et al. | Tracing and revoking leaked credentials: accountability in leaking sensitive outsourced data | |
Aruna et al. | Medical healthcare system with hybrid block based predictive models for quality preserving in medical images using machine learning techniques | |
Almuzaini et al. | Key Aggregation Cryptosystem and Double Encryption Method for Cloud‐Based Intelligent Machine Learning Techniques‐Based Health Monitoring Systems | |
CA2913571A1 (en) | Multi-platform user authentication device with double and multilaterally blind on-the-fly key generation | |
Thilakanathan et al. | Secure multiparty data sharing in the cloud using hardware-based TPM devices | |
Gondkar et al. | Attribute based encryption for securing personal health record on cloud | |
French-Baidoo et al. | Achieving confidentiality in electronic health records using cloud systems | |
Mani et al. | Cryptography in the cloud: securing cloud data with encryption | |
Devassy | Research Project Questions | |
Huang et al. | Optimized Blockchain-Based EMR Sharing via Secure Channel-Free Universal Designated Verifier Signature Proofs | |
Murugesan et al. | Password Authentication Scheme Based On Shape and Text for Secure Sharing Of PHR Using ABE in Cloud | |
Shrishak et al. | Enhancing user privacy in federated eID schemes | |
Gonçalves et al. | A privacy-ensuring scheme for health data outsourcing |